Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 01:15 UTC

General

  • Target

    f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d.docx

  • Size

    351KB

  • MD5

    4d93662383a5a4ede5adaa924360b7fc

  • SHA1

    2156d10195ad7402fba5821886abb12b2f326203

  • SHA256

    f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d

  • SHA512

    335c39b43fa306aac5642ffe69992766fcea0f689a5cb42eff8226efce4f6a45d7e525f673348a23d66aa7bffc84f08237859b6085023dfaf285b5bb868f6822

  • SSDEEP

    6144:V8Cyjf3ktT/T0+RN718HFRdHnwlUhsm6uxPTUqhHB4NhpwqQ3P:OJj8A+RB18HFg6hp6u9TD2vQf

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1744

Network

  • flag-us
    DNS
    urlcallinghta.blogspot.com
    WINWORD.EXE
    Remote address:
    8.8.8.8:53
    Request
    urlcallinghta.blogspot.com
    IN A
    Response
    urlcallinghta.blogspot.com
    IN CNAME
    blogspot.l.googleusercontent.com
    blogspot.l.googleusercontent.com
    IN A
    142.251.36.33
  • flag-nl
    OPTIONS
    https://urlcallinghta.blogspot.com/
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    OPTIONS / HTTP/1.1
    User-Agent: Microsoft Office Protocol Discovery
    Host: urlcallinghta.blogspot.com
    Content-Length: 0
    Connection: Keep-Alive
    Response
    HTTP/1.1 405 Method Not Allowed
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:18 GMT
    Expires: Thu, 02 Mar 2023 01:15:18 GMT
    Cache-Control: private, max-age=0
    X-Content-Type-Options: nosniff
    X-Frame-Options: SAMEORIGIN
    Content-Security-Policy: frame-ancestors 'self'
    X-XSS-Protection: 1; mode=block
    Server: GSE
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
    Accept-Ranges: none
    Vary: Accept-Encoding
    Transfer-Encoding: chunked
  • flag-nl
    HEAD
    https://urlcallinghta.blogspot.com/atom.xml
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    HEAD /atom.xml HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft Office Existence Discovery
    Host: urlcallinghta.blogspot.com
    Response
    HTTP/1.1 404 Not Found
    Cross-Origin-Resource-Policy: cross-origin
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:19 GMT
    Server: Blogger Render Server 1.0
    Content-Length: 3187
    X-XSS-Protection: 0
    X-Frame-Options: SAMEORIGIN
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-nl
    HEAD
    https://urlcallinghta.blogspot.com/atom.xml
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    HEAD /atom.xml HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft Office Existence Discovery
    Host: urlcallinghta.blogspot.com
    Response
    HTTP/1.1 404 Not Found
    Cross-Origin-Resource-Policy: cross-origin
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:20 GMT
    Server: Blogger Render Server 1.0
    Content-Length: 3187
    X-XSS-Protection: 0
    X-Frame-Options: SAMEORIGIN
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-nl
    GET
    https://urlcallinghta.blogspot.com/atom.xml
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    GET /atom.xml HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; ms-office; MSOffice 14)
    Accept-Encoding: gzip, deflate
    Host: urlcallinghta.blogspot.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Cross-Origin-Resource-Policy: cross-origin
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:19 GMT
    Server: Blogger Render Server 1.0
    Content-Length: 3187
    X-XSS-Protection: 0
    X-Frame-Options: SAMEORIGIN
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-nl
    OPTIONS
    https://urlcallinghta.blogspot.com/
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    OPTIONS / HTTP/1.1
    User-Agent: Microsoft Office Protocol Discovery
    Host: urlcallinghta.blogspot.com
    Content-Length: 0
    Connection: Keep-Alive
    Response
    HTTP/1.1 405 Method Not Allowed
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:19 GMT
    Expires: Thu, 02 Mar 2023 01:15:19 GMT
    Cache-Control: private, max-age=0
    X-Content-Type-Options: nosniff
    X-Frame-Options: SAMEORIGIN
    Content-Security-Policy: frame-ancestors 'self'
    X-XSS-Protection: 1; mode=block
    Server: GSE
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
    Accept-Ranges: none
    Vary: Accept-Encoding
    Transfer-Encoding: chunked
  • flag-nl
    GET
    https://urlcallinghta.blogspot.com/atom.xml
    WINWORD.EXE
    Remote address:
    142.251.36.33:443
    Request
    GET /atom.xml HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; ms-office; MSOffice 14)
    Accept-Encoding: gzip, deflate
    Host: urlcallinghta.blogspot.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Cross-Origin-Resource-Policy: cross-origin
    Content-Type: text/html; charset=UTF-8
    Date: Thu, 02 Mar 2023 01:15:20 GMT
    Server: Blogger Render Server 1.0
    Content-Length: 3187
    X-XSS-Protection: 0
    X-Frame-Options: SAMEORIGIN
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-us
    DNS
    www.mediafire.com
    WINWORD.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.mediafire.com
    IN A
    Response
    www.mediafire.com
    IN A
    104.16.53.48
    www.mediafire.com
    IN A
    104.16.54.48
  • 142.251.36.33:443
    https://urlcallinghta.blogspot.com/
    tls, http
    WINWORD.EXE
    1.0kB
    7.7kB
    12
    13

    HTTP Request

    OPTIONS https://urlcallinghta.blogspot.com/

    HTTP Response

    405
  • 142.251.36.33:443
    https://urlcallinghta.blogspot.com/atom.xml
    tls, http
    WINWORD.EXE
    1.1kB
    8.4kB
    11
    14

    HTTP Request

    HEAD https://urlcallinghta.blogspot.com/atom.xml

    HTTP Response

    404

    HTTP Request

    HEAD https://urlcallinghta.blogspot.com/atom.xml

    HTTP Response

    404
  • 142.251.36.33:443
    https://urlcallinghta.blogspot.com/atom.xml
    tls, http
    WINWORD.EXE
    1.0kB
    4.1kB
    9
    9

    HTTP Request

    GET https://urlcallinghta.blogspot.com/atom.xml

    HTTP Response

    404
  • 142.251.36.33:443
    https://urlcallinghta.blogspot.com/
    tls, http
    WINWORD.EXE
    839 B
    1.2kB
    9
    8

    HTTP Request

    OPTIONS https://urlcallinghta.blogspot.com/

    HTTP Response

    405
  • 142.251.36.33:443
    https://urlcallinghta.blogspot.com/atom.xml
    tls, http
    WINWORD.EXE
    1.0kB
    4.1kB
    9
    9

    HTTP Request

    GET https://urlcallinghta.blogspot.com/atom.xml

    HTTP Response

    404
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    732 B
    5.6kB
    9
    9
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    669 B
    5.6kB
    9
    9
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    701 B
    5.6kB
    9
    9
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    764 B
    5.6kB
    9
    9
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    669 B
    5.6kB
    9
    9
  • 104.16.53.48:443
    www.mediafire.com
    tls
    WINWORD.EXE
    701 B
    5.6kB
    9
    9
  • 8.8.8.8:53
    urlcallinghta.blogspot.com
    dns
    WINWORD.EXE
    72 B
    131 B
    1
    1

    DNS Request

    urlcallinghta.blogspot.com

    DNS Response

    142.251.36.33

  • 8.8.8.8:53
    www.mediafire.com
    dns
    WINWORD.EXE
    63 B
    95 B
    1
    1

    DNS Request

    www.mediafire.com

    DNS Response

    104.16.53.48
    104.16.54.48

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

    Filesize

    128KB

    MD5

    30a1738564c226eb0c8f083a913c5741

    SHA1

    5a4586abf065c4516e8248ba373b7b4e4d87c83f

    SHA256

    15eccd61212cc4f5c84ee68e0d4a03c57566256a382cf6196a876c9383c944f4

    SHA512

    9f3c5a6b505ba3bbbc2757c9359fef044244bf97ae16e59dcf77e72c1b7e55de07a7ed69b4e3f5718b55324b329eb24c2e8910554a39fa50d2ff0bd374d9d071

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{45054769-847E-4D4C-AF63-2D0485FBE8B6}.FSD

    Filesize

    128KB

    MD5

    34430317187cbe8a89aaaff30ee97593

    SHA1

    e3dea5b82b88b69abdb28a935b01fd9187de1039

    SHA256

    4c96b6ed56ae36368363ef8176c0221ae0b6314135296a6c8807a10946a9f36e

    SHA512

    3ca6341a1e2bd2e9a2dbc5180a2db3aaeca39d20033e5743e812f4962051c9d5ef43b5869ec79938b4719feba2ab38ab7073fad4426152aa30538036a0379b9f

  • C:\Users\Admin\AppData\Local\Temp\Cab36BE.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar38E7.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\{B40ADE66-3BEE-4623-85C7-348465769DC5}

    Filesize

    128KB

    MD5

    d28c34e6d036d269f7020edc54e15c33

    SHA1

    e8ba9f4e02bdcb46c3bd5a8a2bdf679fc66c36c7

    SHA256

    97ac21c30c44d40ec0162cdc854d77c2baf5b32e5615d20626f70692bfce10fe

    SHA512

    1a8a7b44ab89719480cc49a4b9e79865a7d6ce13e4d78c71ce8cb79a399e153cefb3df7b9f53a4da984fa0ef0a74e02332efa9e47cfbfc5eeeb4ce50a1755a34

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    20KB

    MD5

    1dcbd1dafec7df43a082845b2bd45321

    SHA1

    483b5cd374adc27fb2cd68d7e8bddea6b980e84b

    SHA256

    4b75597b2b0ad8a2073b7c04cec32af69bf88f7ae547b5c1e906a39f0ddd72d5

    SHA512

    fa62d8c46b9464c7973a9f179cdb3af1190f57e6869df99807d265b2735a3453ba65404c974b03adfad9856b69bcbee9539ea4534b08bbfcddaea2d8a34e3c42

  • memory/1744-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1744-772-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.